Ken “The Virus Doctor” Dwight on Malware Threats at SpiceWorld 2017

The Virus DoctorKen “The Virus Doctor” Dwight and I sat down at SpiceWorld 2017 to discuss ransomware and other malware threats to you and your security. Ken Dwight has been in the cybersecurity business for as long as cybersecurity has been a thing and long before anyone coined the term, cybersecurity.

Ken also offers his book and a Virus Remediation class from his website. He has helped many companies recover from virus infestations, ransomware attacks, and various malware infections. He is a consultant, a speaker, and a practitioner in the dark art of virus killing.

It was a pleasure to speak with Mr. Dwight on camera at SpiceWorld 2017.

Copyright 2017 The SecurityNOW Show. License: CC BY.

Data Science and Security with SOPHOS Data Scientist Hillary Sanders

SOPHOSHillary Sanders and I sat down for a chat at SpiceWorld 2017 in Austin about data science and security. We discussed the ins and outs of data science, machine learning, neural networks, and how this data helps security researchers. Ms. Sanders is a data scientist and data science researcher at SOPHOS. As you’ll see in the video, she loses me in part of the discussion. I’m very familiar with biological neural networks but the computer ones are pretty complex. These neural networks and their reliance on big data is the significant first step toward some pretty impressive artificial intelligence (AI) possibilities.

Although Elon Musk and Stephen Hawking have warned us about the future of AI, I think that AI is the true future of computing. And I’ve thought so for a very long time, beginning back in the day when I wanted to learn LISP and Prolog programming. Unfortunately, I did not have the financial resources to learn those languages at the time. I digress.

Hillary explains data science and her work in such a way that I hope many more young people will be inspired to follow her into this next exciting chapter of computing. She is also an accomplished artist and you should view her work at hillarysanders.com. Her site isn’t just art, it’s also about her work as a data scientist and a programmer. Check out the Cheatsheets page.

Copyright 2017 SecurityNOW. License: CC BY.

“Manage Access, Not Keys” with Tatu Ylönen (Podcast)

SSH CommunicationsGreetings SSH fans. Preston and I had the pleasure of speaking with SSH Communications Security founder Tatu Ylönen about keyless access and how system administrators and system security professionals should “manage access, not keys” when using the SSH protocol.

Preston and I debate the security of a decision to use passwordless and keyless access. During the call, we asked how to implement keyless access and what the deployment looks like to a system administrator. Preston and I are both system administrators, so we are definitely interested in the ins-and-outs of deployment.

Tatu YlönenAs always, Tatu is very engaging and extremely knowledgeable about the topic of security, SSH, and access management.

Podcast details:

Length: 15:52 minutes. Format: MP3. Rating: G for all audiences.

Copyright 2017 SecurityNOW. License: CC BY.

The Worst Cybersecurity Breaches of 2016 (Podcast)

BeyondTrustPreston and I interviewed Morey Haber, BeyondTrust’s VP of Technology, and discussed 2016’s top five cybersecurity breaches. If you’d like to read more about Morey’s information on these breaches, check out his blog post, “The 5 Worst Breaches of 2016 – and What to Expect in 2017.

In our podcast, we cover the worst breaches plus additional content related to how to protect yourself from such breaches. Morey also mentions how BeyondTrust’s products can help protect you and your data.

Podcast details:

Length: 21:30 minutes. Format: MP3. Rating: G for all audiences.

Be sure to check out BeyondTrust’s security products.